메뉴 건너뛰기




Volumn 26, Issue 8, 2012, Pages 760-786

An overview of data mining for combating crime

Author keywords

[No Author keywords available]

Indexed keywords

CRIME;

EID: 84866604735     PISSN: 08839514     EISSN: 10876545     Source Type: Journal    
DOI: 10.1080/08839514.2012.713309     Document Type: Review
Times cited : (13)

References (65)
  • 3
    • 0001907967 scopus 로고    scopus 로고
    • Support Vector Machines: Hype or Hallelujah?
    • Bennett, K. P., and C. Campbell. 2000. Support vector machines: Hype or hallelujah? SIGKDD Explorations 2 (2): 1-13.
    • (2000) SIGKDD Explorations , vol.2 , Issue.2 , pp. 1-13
    • Bennett, K.P.1    Campbell, C.2
  • 4
    • 85125896304 scopus 로고    scopus 로고
    • Arguments, stories and criminal evidence: A formal hybrid theory
    • Dordrecht, The Netherlands: Springer
    • Bex, F. 2011. Arguments, stories and criminal evidence: A formal hybrid theory, Springer Law and Philosophy Library, 92. Dordrecht, The Netherlands: Springer.
    • (2011) Springer Law and Philosophy Library , vol.92
    • Bex, F.1
  • 5
    • 84937343759 scopus 로고    scopus 로고
    • Exploratory network visualization: Simultaneous display of actor status and connections
    • Brandes, U., J. Raab, and D. Wagner. 2001. Exploratory network visualization: Simultaneous display of actor status and connections. Journal of Social Structure 2 (4). http://www.cmu.edu/joss/content/articles/volume2/ BrandesRaabWagner.html.
    • (2001) Journal of Social Structure , vol.2 , pp. 4
    • Brandes, U.1    Raab, J.2    Wagner, D.3
  • 6
    • 20344365949 scopus 로고    scopus 로고
    • The analysis of social networks
    • ed. M. Hardy and A. Bryman London: SAGE
    • Breiger, R. L. 2004. The Analysis of Social Networks. In Handbook of Data Analysis, ed. M. Hardy and A. Bryman, 505-526. London: SAGE.
    • (2004) Handbook of Data Analysis , pp. 505-526
    • Breiger, R.L.1
  • 7
    • 79951822517 scopus 로고    scopus 로고
    • Learning with support vector machines
    • Published online in .pdf in February 2011 by Morgan and Claypool in the United States . doi:==10.2200=S00324ED1V01Y201102AIM010
    • Campbell, C., and Y. Ying. 2011. Learning with support vector machines. Synthesis Lectures on Artificial Intelligence and Machine Learning 5 (1): 1-95. Published online in .pdf in February 2011 by Morgan and Claypool in the United States . doi:==10.2200=S00324ED1V01Y201102AIM010
    • (2011) Synthesis Lectures on Artificial Intelligence and Machine Learning , vol.5 , Issue.1 , pp. 1-95
    • Campbell, C.1    Ying, Y.2
  • 8
    • 84866599051 scopus 로고    scopus 로고
    • Recursive data mining for role identification in electronic communications
    • Chaoji, V., A. Hoonlor, and B. K. Szymanski. 2010. Recursive data mining for role identification in electronic communications. International Journal of Hybrid Information Systems 7 (3): 89-100. Also at: http://www.cs.rpi.edu/ ~szymansk/papers/ijhis.09.pdf
    • (2010) International Journal of Hybrid Information Systems , vol.7 , Issue.3 , pp. 89-100
    • Chaoji, V.1    Hoonlor, A.2    Szymanski, B.K.3
  • 15
    • 34249753618 scopus 로고
    • Support-vector networks
    • Cortes, C., and V. Vapnik. 1995. Support-vector networks. Machine Learning 20: 273-277.
    • (1995) Machine Learning , vol.20 , pp. 273-277
    • Cortes, C.1    Vapnik, V.2
  • 17
    • 0042367634 scopus 로고    scopus 로고
    • Mining E-mail content for author identification forensics
    • de Vel, O., A. Anderson, M. Corney, and G. Mohay. 2001. Mining E-mail content for author identification forensics. ACM SIGOD Record 30(4): 55-64. (Pubitemid 33720999)
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 55-64
    • De Vel, O.1    Anderson, A.2    Corney, M.3    Mohay, G.4
  • 18
    • 84904815517 scopus 로고    scopus 로고
    • Modeling identity in archival collections of email: A preliminary study
    • CEAS 2006, Mountain View, CA, July
    • Elsayed, T., andD.W. Oard. 2006.Modeling identity in archival collections of email: A preliminary study. Presented at the Third Conference on Email and Anti-Spam, CEAS 2006, Mountain View, CA, July 27-28.
    • (2006) Third Conference on Email and Anti-Spam , pp. 27-28
    • Elsayed, T.1    Oard, D.W.2
  • 19
    • 35048856222 scopus 로고    scopus 로고
    • Brain MR image segmentation using fuzzy clustering with spatial constraints based on Markov random field theory
    • Medical Imaging and Augmented Reality: Proceedings of the Second International Workshop (MIAR 2004), ed. G.-Z. Yang and T. Jiang Beijing, China, August 19-20, 2004 Berlin: Springer
    • Feng, Y., and W. Chen. 2004. Brain MR image segmentation using fuzzy clustering with spatial constraints based on Markov random field theory. In Medical Imaging and Augmented Reality: Proceedings of the Second International Workshop (MIAR 2004), ed. G.-Z. Yang and T. Jiang, 188-195. Beijing, China, August 19-20, 2004. (Lecture Notes in Computer Science 3150.) Berlin: Springer.
    • (2004) Lecture Notes in Computer Science , vol.3150 , pp. 188-195
    • Feng, Y.1    Chen, W.2
  • 25
    • 0016494374 scopus 로고
    • The application of link analysis to police intelligence
    • Harper, W. R., and D. H. Harris. 1975. The application of link analysis to police intelligence. Human Factors 17 (2): 157-164.
    • (1975) Human Factors , vol.17 , Issue.2 , pp. 157-164
    • Harper, W.R.1    Harris, D.H.2
  • 26
    • 0036500849 scopus 로고    scopus 로고
    • COPLINK concept space: An application for criminal intelligence analysis
    • Hauck, R. V., H. Atabakhsh, P. Ongvasith, H. Gupta, and H. Chen. 2002. COPLINK concept space: An application for criminal intelligence analysis. IEEE Computer 35 (3): 30-37.
    • (2002) IEEE Computer , vol.35 , Issue.3 , pp. 30-37
    • Hauck, R.V.1    Atabakhsh, H.2    Ongvasith, P.3    Gupta, H.4    Chen, H.5
  • 29
    • 74349130571 scopus 로고    scopus 로고
    • Link analysis of fuel laundering scams and implications of results for scheme understanding and prosecutor strategy
    • ed. G. Governatori July 25. Amsterdam: IOS Press
    • Jȩdrzejek, C., M. Falkowski, and M. Smolenski. 2009. Link analysis of fuel laundering scams and implications of results for scheme understanding and prosecutor strategy. In Proceedings of legal knowledge and information systems: JURIX 2009, ed. G. Governatori, 79-88. July 25. Amsterdam: IOS Press.
    • (2009) Proceedings of Legal Knowledge and Information Systems: JURIX 2009 , pp. 79-88
    • Jȩdrzejek, C.1    Falkowski, M.2    Smolenski, M.3
  • 30
    • 33645996012 scopus 로고    scopus 로고
    • Image denoising using complex wavelets and Markov prior models
    • Image analysis and recognition: Proceedings of the 2nd international conference (ICIAR 2005) ed. M. Kamel and A. Campilho,73-80 Toronto Canada September Berlin Springer
    • Jin, F., P. Fieguth, and L. Winger. 2005. Image denoising using complex wavelets and Markov prior models. In Image analysis and recognition: Proceedings of the 2nd international conference (ICIAR 2005), ed. M. Kamel and A. Campilho, 73-80. Toronto, Canada, September 28-30. (Lecture Notes in Computer Science, 3656.) Berlin: Springer.
    • (2005) Lecture Notes in Comuter Science , vol.3656 , pp. 28-30
    • Jin, F.1    Fieguth, P.2    Winger, L.3
  • 31
    • 28844486722 scopus 로고    scopus 로고
    • Computer aided tracking and characterization of homicides and sexual assaults (CATCH)
    • Kangas, L. J., K. M. Terrones, R. D. Keppel, and R. D. La Moria. 2003. Computer aided tracking and characterization of homicides and sexual assaults (CATCH). In Mena (2003), 364-375.
    • (2003) Mena , pp. 364-375
    • Kangas, L.J.1    Terrones, K.M.2    Keppel, R.D.3    La Moria, R.D.4
  • 33
    • 84947923186 scopus 로고    scopus 로고
    • A Markov random field image segmentation model using combined color and texture features
    • Computer Analysis of Images and Patterns: Proceedings of the 9th International Conference (CAIP 2001),ed. W. Skarbek, 547-554. Warsaw, Poland, September Berlin: Springer
    • Kato, Z., and T.-C. Pong. 2001. A Markov random field image segmentation model using combined color and texture features. In Computer Analysis of Images and Patterns: Proceedings of the 9th International Conference (CAIP 2001), ed. W. Skarbek, 547-554. Warsaw, Poland, September 5-7. (Lecture Notes in Computer Science, 2124.) Berlin: Springer.
    • (2001) Lecture Notes in Computer Science , vol.2124 , pp. 5-7
    • Kato, Z.1    Pong, T.-C.2
  • 37
    • 70449530555 scopus 로고
    • Finding excuses with ALIBI: Alternative plans that are deontically more defensible
    • Lisbon, September 1989. Also in Computers and Artificial Intelligence, 10 4) 297-325 and in Information technology and society Theory uses impacts ed J Lopes Alves Lisbon : APDC and SPF
    • Kuflik, T. S., E. Nissan, and G. Puni. 1989. Finding excuses with ALIBI: Alternative plans that are deontically more defensible. In Proceedings of the international symposium on communication, meaning and knowledge vs. information technology, Lisbon, September 1989. Also in Computers and Artificial Intelligence, 10 (4): 297-325, and in Information technology and society: Theory, uses, impacts, ed. J. Lopes Alves, 484-510. Lisbon : APDC and SPF (1992).
    • (1989) Proceedings of the International Symposium on Communication, Meaning and Knowledge Vs. Information Technology , pp. 484-510
    • Kuflik, T.S.1    Nissan, E.2    Puni, G.3
  • 39
    • 85087291702 scopus 로고    scopus 로고
    • Mathematical MRF models
    • ed. S. Z. Li (Advances in Computer Vision and Pattern Recognition series; originally published in the series: Computer Science Workbench, 3rd ed.) Tokyo: Springer-Verlag ,2001
    • Li, S. Z. 2009. Mathematical MRF models. In Markov Random Field Modeling in Image Analysis, ed. S. Z. Li, 1-28 (Advances in Computer Vision and Pattern Recognition series; originally published in the series: Computer Science Workbench, 3rd ed.) Tokyo: Springer-Verlag (2001).
    • (2009) Markov Random Field Modeling in Image Analysis , pp. 1-28
    • Li, S.Z.1
  • 42
    • 0346568563 scopus 로고    scopus 로고
    • Formal approaches to legal evidence. Special issue
    • Martino, A. A., and E. Nissan, eds. 2001. Formal approaches to legal evidence. Special issue, Artificial Intelligence and Law 9 (2-3): 85-224.
    • (2001) Artificial Intelligence and Law , vol.9 , Issue.2-3 , pp. 85-224
    • Martino, A.A.1    Nissan, E.2
  • 44
    • 85181551245 scopus 로고    scopus 로고
    • Ch. 17 Image fusion: theories, techniques and applications. H. B. Mitchell. Berlin: Springer. doi:==10.1007=978-3-642-11216-4-17
    • Mitchell, H. B. 2010. Markov random fields. Ch. 17, 205-209 In Image fusion: theories, techniques and applications. H. B. Mitchell. Berlin: Springer. doi:==10.1007=978-3-642-11216-4-17
    • (2010) Markov Random Fields , pp. 205-209
    • Mitchell, H.B.1
  • 49
    • 84866627792 scopus 로고    scopus 로고
    • Software, formal models, and artificial intelligence for legal evidence
    • Nissan, E., and A. A. Martino, eds. 2001. Software, formal models, and artificial intelligence for legal evidence. Computing and Informatics (special issue) 20 (6): 509-656.
    • (2001) Computing and Informatics (Special Issue) , vol.20 , Issue.6 , pp. 509-656
    • Nissan, E.1    Martino, A.A.2
  • 50
    • 85011452114 scopus 로고    scopus 로고
    • Building blocks for an artificial intelligence framework in the field of legal evidence
    • (4=5): 233-411, 34 (6=7)
    • Nissan, E., and A. A. Martino, eds. 2003. Building blocks for an artificial intelligence framework in the field of legal evidence. Cybernetics and Systems (special issue in two parts) 34 (4=5): 233-411, 34 (6=7): 413-583.
    • (2003) Cybernetics and Systems (Special Issue in Two Parts) , vol.34 , pp. 413-583
    • Nissan, E.1    Martino, A.A.2
  • 51
    • 2442484762 scopus 로고    scopus 로고
    • The construction of judicial proof: A challenge for artificial intelligence modelling
    • Nissan, E., and A. A. Martino, eds. 2004. The construction of judicial proof: A challenge for artificial intelligence modelling. Applied Artificial Intelligence (special issue) 18(3=4): 183-393.
    • (2004) Applied Artificial Intelligence (Special Issue) , vol.18 , Issue.3-4 , pp. 183-393
    • Nissan, E.1    Martino, A.A.2
  • 52
    • 35348860262 scopus 로고    scopus 로고
    • Netprobe: A fast and scalable system for fraud detection in online auction networks
    • DOI 10.1145/1242572.1242600, 16th International World Wide Web Conference, WWW2007
    • Pandit, S., D. H. Chau, S. Wang, and C. Faloutsos. 2007. NetProbe: A fast and scalable for fraud detection in online auction networks. In WWW 2007: Proceedings of the 16th International Conference on World Wide Web, 201-210. Alberta, Canada. New York, NY: ACM. (Pubitemid 47582250)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 201-210
    • Pandit, S.1    Chau, D.H.2    Wang, S.3    Faloutsos, C.4
  • 53
    • 37149053967 scopus 로고    scopus 로고
    • A comprehensive survey of data-mining-based fraud detection research
    • Monash University, Clayton, Victoria, Australia
    • Phua, C., V. Lee, K. Smith-Miles, and R. Gayler. 2005. A comprehensive survey of data-mining-based fraud detection research. Clayton School of Information Technology, Monash University, Clayton, Victoria, Australia. http://clifton.phua.googlepages.com
    • (2005) Clayton School of Information Technology
    • Phua, C.1    Lee, V.2    Smith-Miles, K.3    Gayler, R.4
  • 60
    • 84971733614 scopus 로고
    • Explanatory coherence
    • Commentaries and rioste u to 502
    • Thagard, P. 1989. Explanatory coherence. Behavioural and Brain Sciences 12 (3): 435-467. (Commentaries and riposte up to 502.)
    • (1989) Behavioural and Brain Sciences , vol.12 , Issue.3 , pp. 435-467
    • Thagard, P.1
  • 62
    • 70449983750 scopus 로고    scopus 로고
    • Discovery of email communication networks from the Enron corpus with a genetic algorithm using social network analysis
    • Trondheim, Norway, May
    • Wilson, G., and W. Banzhaf. 2009. Discovery of email communication networks from the Enron corpus with a genetic algorithm using social network analysis. In Proceedings of the 11th conference on evolutionary computation, 3256-3263. Trondheim, Norway, May 18-21.
    • (2009) Proceedings of the 11th Conference on Evolutionary Computation, 3256-3263 , pp. 18-21
    • Wilson, G.1    Banzhaf, W.2
  • 63
    • 25444517581 scopus 로고    scopus 로고
    • Visualizing criminal relationships: Comparison of a hyperbolic tree and a hierarchical list
    • DOI 10.1016/j.dss.2004.02.006, PII S0167923604001125
    • Xiang, Y., M. Chau, H. Atabakhsh, and H. Chen. 2005. Visualizing criminal relationships: Comparisons of a hyperbolic tree and a hierarchical list. Decision Support System 41:69-83. (Pubitemid 41375566)
    • (2005) Decision Support Systems , vol.41 , Issue.1 , pp. 69-83
    • Xiang, Y.1    Chau, M.2    Atabakhsh, H.3    Chen, H.4
  • 64
    • 4544224894 scopus 로고    scopus 로고
    • Fighting organized crimes: Using shortest-path algorithms to identify associations in criminal networks
    • Xu, J. J., and H. Chen. 2004. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems 38:473-487.
    • (2004) Decision Support Systems , vol.38 , pp. 473-487
    • Xu, J.J.1    Chen, H.2
  • 65
    • 0141695638 scopus 로고    scopus 로고
    • Understanding belief propagation and its generalizations
    • ed. G. Lakemeyer and B. Nebel. San Francisco, CA: Morgan Kaufmann. (Previously, Technical Report TR-2001-2022, Mitsubishi Electric Research, 2001.)
    • Yedidia, J. S., W. T. Freeman, and Y. Weiss. 2003. Understanding belief propagation and its generalizations. In Exploring Artificial Intelligence in the New Millennium, ed. G. Lakemeyer and B. Nebel, 239-269. San Francisco, CA: Morgan Kaufmann. (Previously, Technical Report TR-2001-22, Mitsubishi Electric Research, 2001.)
    • (2003) Exploring Artificial Intelligence in the New Millennium , pp. 239-269
    • Yedidia, J.S.1    Freeman, W.T.2    Weiss, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.